Boleh VPN


What does BolehVPN Do?

A simplified illustration of understanding what BolehVPN is akin to your typical spy story:

“You’re an important person conducting some confidential business and want your identity and your communications to be secret. You don’t even want people to know the type of transactions you are doing. You hire a secret agent that speaks a secret language that only you and him know to do your transactions on your behalf. No one really knows who you are nor what you are speaking to your secret agent.”

Now replace the important person with your computer, your communications to become your internet traffic and the secret agent as our BolehVPN server and you have an easy way to understand what a VPN does! We’re the secret agent for you!

Like the secret agent that speaks the language that only you and he can understand, communications between our VPN server and your computer are encrypted so outsiders cannot analyze or decipher the contents of this data.

Furthermore, the VPN server establishes connections as if it were your computer but outsiders can only see our VPN server, not you so it effectively protects your privacy.

A VPN also hides the type of traffic that you are using through your internet connection. ISPs tend to deprioritize P2P traffic due to it being notorious for using large amounts of data. P2P traffic has certain characteristics akin to a fingerprint which can be spotted by an Internet Service Provider (ISP). Using a VPN to encrypt the data changes the data in such a way that it no longer matches the fingerprint the ISP is looking for.

Now that you’ve grasped the main concept of what we do, let’s move on to the more official explanation!

A More Technical (but more accurate) Description

A VPN (short for Virtual Private Network), secures your Internet connection by creating a secure encrypted tunnel from your computer to our servers which then establishes connections on behalf of you hiding your identity and also encrypting your data between our servers and your computer.

Many ISPs also employ devices that analyze the type of traffic that goes through your internet such as P2P, torrent traffic and slow it down. A VPN changes the type of traffic into the same type that large corporate organizations used to secure their networks which therefore bypasses such devices.

Key Features

Our VPN system has the following features:

  • Protects your privacy by masking your IP
  • Uses the secure and robust OpenVPN framework, more secure and stable than PPTP!
  • Remove p2p/BitTorrent throttling or traffic shaping. A VPN optimized for P2P.
  • Prevents your ISP by analyzing your traffic via SSL and Blowfish encryption
  • Supports speeds up to 4 mbit
  • No monthly transfer limit
  • 300 connections limit (recommended 230 global)
  • bility to choose which traffic is routed via the VPN
  • Full access to servers located in United Kingdom, Luxembourg, Canada and USA.
  • Personalized customer support and large community of users


We have no control over nor are we under any obligation to monitor what our customers use our VPN for. By agreeing to subscribe to BolehVPN, you as our customer agree to take full responsibility to abide to the relevant laws including but not limited to copyright laws, bans on encryption and your ISP’s terms of service when using our VPN and indemnify us for any violation of the relevant laws that results in a loss to us or the bringing of any claim against us.


  1. Xander
    08.05.2012, 2:33 pm

    Joey yes saw that but guess what that site can’t be accessed from China!Michael takhns I’ll try to keep the witty titles coming sometimes I’m so tired I’m just trying to make complete sentences good to hear it comes through as witty Thomas you might be right but when the nearest photo position to the action is 50 yards away from the action and the setting is blah that 400mm 2.8 comes in handy Pius Oh I know about VPN trust me that’s the funny part I had one VPN working for one day and it got blocked then the next VPN got blocked they’re watching!Hope you don’t my answering all in one post little time prefer sleep v

    VA:F [1.9.21_1169]
    Rating: 0 (from 0 votes)
  2. Sharon
    10.05.2012, 3:26 am

    Vincent,There are a few nifty tricks to bypsas the wall, especially if you are comfortable with the command line, which I think you are.Firstly, set up a remote SSH tunnel to a server that has a proxy on. There are a handful of tutorials out there that help with this, but the 2 main ingredients are:1: a proxy outside of the US with ssh and squid running2: the ability to setup a tunnel on your computer and configure your browser to use that for net access.Drop me a mail if you need any help in setting them up or testing the route from your laptop out, last time I was there, it was pretty easy to bypsas most of their restrictions.

    VA:F [1.9.21_1169]
    Rating: 0 (from 0 votes)

Leave a Reply

You must be logged in to post a comment.